EC-Council ECSAv10 Exam Questions
EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing (Page 3 )

Updated On: 24-Feb-2026

Which of the following is the range for assigned ports managed by the Internet Assigned Numbers Authority (IANA)?

  1. 3001-3100
  2. 5000-5099
  3. 6666-6674
  4. 0 ­ 1023

Answer(s): D



If a web application sends HTTP cookies as its method for transmitting session tokens, it may be vulnerable which of the following attacks?

  1. Parameter tampering Attack
  2. Sql injection attack
  3. Session Hijacking
  4. Cross-site request attack

Answer(s): D



Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?

  1. %systemroot%\LSA
  2. %systemroot%\repair
  3. %systemroot%\system32\drivers\etc
  4. %systemroot%\system32\LSA

Answer(s): B



Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for breaking messages into segments, re-assembling them at the destination station, and re-sending. Which one of the following protocols does not use the TCP?

  1. Reverse Address Resolution Protocol (RARP)
  2. HTTP (Hypertext Transfer Protocol)
  3. SMTP (Simple Mail Transfer Protocol)
  4. Telnet

Answer(s): A



Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.
link:www.ghttech.net
What will this search produce?

  1. All sites that link to ghttech.net
  2. Sites that contain the code: link:www.ghttech.net
  3. All sites that ghttech.net links to
  4. All search engines that link to .net domains

Answer(s): A






Post your Comments and Discuss EC-Council ECSAv10 exam dumps with other Community members:

Join the ECSAv10 Discussion